Revision history of "Gila CMS 2.0.0 遠程代碼執行漏洞"

From PwnWiki

Diff selection: Mark the radio boxes of the revisions to compare and hit enter or the button at the bottom.
Legend: (cur) = difference with latest revision, (prev) = difference with preceding revision, m = minor edit.

  • curprev 17:51, 8 April 2021Pwnwiki talk contribs 671 bytes +671 Created page with "==EXP== <pre> # Exploit Title: Gila CMS 2.0.0 - Remote Code Execution (Unauthenticated) # Date: 1.12.2021 # Exploit Author: Enesdex # Vendor Homepage: https://gilacms.com/ # S..."